Fast Searching for Andrews Curtis Trivializations

Size: px
Start display at page:

Download "Fast Searching for Andrews Curtis Trivializations"

Transcription

1 Fast Searching for Andrews Curtis Trivializations R. Sean Bowman and Stephen B. McCaul CONTENTS 1. Introduction 2. Breadth-First Search 3. Experiments and Discussion 4. Conclusion Acknowledgments References A high-performance computer program for searching a tree of words in the group generated by Andrews Curtis transformations is presented. The program enumerates words in this group using a disk-based hash table to store words already seen. We discuss several issues that affect the performance of the program and examine the growth of the size of the Cayley graph being searched. 1. INTRODUCTION The Andrews Curtis conjecture states that every balanced presentation of the trivial group can be transformed to the presentation x 1,...,x n x 1,...,x n by a sequence of certain moves. We present a program that searches for sequences of these moves and applies them to some presentations that are particularly tough to reduce. Our program makes effective use of disk-based memory in order to scale to larger searches and relies on a concept of canonical form in order to reduce the size of the search space. Let P = x 1,...,x i r 1,...,r j be a group presentation. We say that P is balanced if i = j. The trivial presentation of the trivial group is the balanced presentation x 1,...,x n x 1,...,x n. The group of Andrews Curtis transformations on balanced presentations with n generators, AC n, is the group generated by the following transformations: 1. replace r i with r i r j for some j i, 2. replace r i with r 1 i,and 3. replace r i with gr i g 1, where g is a generator or its inverse AMS Subject Classification: 20-04, 20F05 Keywords: Andrews Curtis conjecture, computer search There are n 2 n moves of the first kind, n of the second kind, and 2n 2 of the third kind. The group AC n acts on the set of balanced presentations with n generators in the obvious way. Two balanced presentations on n generators P 1 and P 2 are AC-equivalent if there is an element σ AC n such that σp 1 = P 2. Andrews and c A K Peters, Ltd /2006 $ 0.50 per page Experimental Mathematics 15:2, page 193

2 194 Experimental Mathematics, Vol. 15 (2006), No. 2 Curtis [Andrews and Curtis 65] conjectured that every balanced presentation of the trivial group on n generators is AC-equivalent to the trivial presentation. Another way of saying this is that the orbit of the trivial presentation of the trivial group under AC n includes every balanced presentation of the trivial group with n generators. In this paper, we present software for finding Andrews Curtis trivializations of balanced presentations of the trivial group. The software is available at and is licensed under the GNU GPL. Using breadth-first search to search for Andrews Curtis trivializations is a technique first investigated by Havas and Ramsay [Havas and Ramsay 03]. They were able to verify that the Akbulut Kirby presentation of the trivial group for n = 2 is AC trivial. Miasnikov [Miasnikov 99] used a genetic programming approach to eliminate potential counterexamples to the Andrews Curtis conjecture. Casson [Casson 03] described a set of programs to examine equivalence classes of group presentations modulo Andrews Curtis transformations. We adapted his ideas on using a canonical form for presentations in order to make it easier to determine which have been seen before. 2. BREADTH-FIRST SEARCH One way to show that a balanced presentation on n generators P is AC-equivalent to the trivial presentation is to enumerate words in AC n, apply them to P, and see whether the result contains the trivial presentation. In order to enumerate words of AC n, we use a breadth-first search. Breadth-first search is a technique for searching a graph for some distinguished vertex. In this case, the graph is a tree with the identity transformation at its root and all words of length m at the mth level. Since some sequences of transformations yield the identity transformation (for example, inverting r 1 twice), the tree contains redundant words. Two presentations may differ by a cyclic permutation of one or more relators. In order to know when two presentations are the same, equivalence classes of presentations under cyclic permutation of relators are represented by a presentation in canonical form. Generators are ordered and assigned a numerical value. A relator can then be represented as a tuple of numbers. For example, if a =1andb =2,thewordabab 1 a 1 b 1 is represented by the tuple (1, 2, 1, 2, 1, 2). We examine the relator s cyclic permutations and select the lexicographically largest one as the canonical representative. To get the canonical presentation, we sort the relators lexicographically, padding with zeros when the tuples are of different sizes. For example, the canonical representative of is a, b abab 1 a 1 b 1,a 2 b 3 a, b a 2 b 3, bab 1 a 1 b 1 a. The algorithm begins by inserting the presentation to be checked for reducibility into a queue. This presentation, which represents the identity transformation, is the root of the tree that will be constructed. The algorithm loops by taking a presentation off the queue, applying each of the 3n 2 generators of AC n to it, and putting the presentations that haven t been seen before back on the queue. To tell which presentations have been seen before, we use a hash table. Our hash table uses a multiplicative hash scheme [Knuth 73] based on canonicalized presentations. This hash scheme produces a number based on the tuple representation of a group presentation P as discussed above. The hash value is used to index an array of indices to lists of presentations on disk. There is one list for every hash value so that all presentations with identical hash values can be quickly compared with P. If no presentation matches P then P is not in the hash table, and P can be added to the hash table by appending it to the list of other presentations with the same hash value. In order to search large trees, the hash table is kept on disk. Since disk IO is much slower than memory, some performance aspects of the hash table merit attention. The index of presentation lists is in memory and can determine without any disk access whether P is not a member when no presentation with the same hash value of P has been added to the hash table. When a presentation is added it is cached in RAM and written to disk in large groups to reduce the number of separate disk accesses. This cache also functions as a read cache when a presentation list has a member that has not yet been written to disk. When a search starts running, the majority of membership tests take no disk access, since most presentation lists are empty. During this phase the main use of time is in computing the hash values. As the search progresses more time is spent reading in presentation lists from disk. This is the dominant time use for the majority of a large search. The algorithm emits a proof when it has reduced all but one relator to a single letter. This means that our algorithm doesn t actually find a word σ AC n such that σp is the trivial presentation. A word that reduces

3 Bowman and McCaul: Fast Searching for Andrews Curtis Trivializations 195 all but one relator to one letter can be easily extended to a word that does trivialize P by repeated conjugation and multiplication by the single-letter relators. This optimization greatly reduces the size of the search space (especially for the case n = 2). Note that this optimization also makes the forward search for the word in AC n that trivializes a presentation much more practical than the backward search for the inverse of this word. 3. EXPERIMENTS AND DISCUSSION The presentation a, b abab 1 a 1 b 1,a n b (n+1) for n N is a balanced presentation of the trivial group due to Akbulut and Kirby. This presentation for n = 3is the smallest potential counterexample to the Andrews Curtis conjecture [Havas and Ramsay 03]. We ran a series of experiments in which we searched for trivializations of the Akbulut Kirby presentations for n =2, 3, 4, and 5, varying the maximum relator length. We searched the tree for n = 2 from maximum relator length 10 to 25, the n = 3 tree from 10 to 17, n = 4 from 10 to 16, and n = 5 from 11 to 18. In each case the program was to stop if a trivialization was found, but trivializations were found only for the n = 2 case. The computer used for exploring the Akbulut Kirby presentations is an IBM z800 mainframe with a Sharc disk array. The IBM mainframe is a class of computers well known for its high-performance disk. This is due to the use of dedicated processors for performing disk operations, high-speed communications between CPU and disk, and the extensive use of cache. The Sharc array used during our research had 8 GB of cache and the operating system had access to 1 GB of system RAM. The software was run under Linux for z/series. Even when duplicate presentations are eliminated, the number of presentations in the tree of AC moves generated by breadth-first search grows exponentially at first, as shown in Figure 1. As the search continues, many of the presentations are found in the hash table, and so the number of presentations eventually reaches a plateau. With two relators constrained to a length of fewer than 17 generators, a typical modern computer with 1 GB of RAM can hold a hash table with about 32 million entries. To compute the Akbulut Kirby tree for n = 3 with relators constrained to a length of fewer than 17 generators, 85 million presentations must be searched (see Figure 2). The large size of the tree necessitates the use of diskbased storage. The n = 3 run with maximum relator length 17 was the longest run, taking 93 hours. Approximately 41 GB number of presentations number of presentations by depth FIGURE 1. Number of presentations by depth for AK n =3 with relator length less than duplicate presentations found presentations in hashtable presentations removed from queue FIGURE 2. Queue statistics for AK n = 3, maximum relator length 17. of disk space was used. Figure 3 shows that the search space grows exponentially with increasing maximum relator length nodes FIGURE 3. Number of presentations for AK n =3byrelator lengths. Although we couldn t crack the Akbulut Kirby presentation, our software is able to find relatively lengthy trivializations of a sequence of presentations due to Gordon; see [Brown 84]. These presentations have the form a, b a =[a m,b n ],b=[a p,b q ] for m, n, p, q N.

4 196 Experimental Mathematics, Vol. 15 (2006), No. 2 Our software showed that all ten presentations in this sequence whose total relator length is 14 are AC-trivializable, and most of these have relatively short proofs. However, the presentation a, b aba 2 b 1,ab 3 a 1 b 4 shows the advantages of diskbased storage. Its trivialization consists of 20 moves and was found using the heuristic of expanding the presentation with smallest total relator length after 6 moves. Beginning with the presentation we obtain a, b aba 2 b 1,ab 3 a 1 b 4 a, b ba 2 b 1 a 1,ab 3 a 1 b 4 (invert r 0 ) a, b b 2 a 2 b 1 a 1 b 1,ab 3 a 1 b 4 (conjugate r 0 by b) a, b ba 2 b 1 a 1,ab 3 a 1 b 2 a 2 b 1 a 1 b 1 (multiply r 1 = r 1 r 0 ) a, b ba 2 b 1 a 1,b 2 a 1 b 2 a 2 b 1 a (multiply r 1 = r 1 r 0 ) a, b ba 2 b 1 a 1,ab 2 a 1 b 2 a 2 b 1 (conjugate r 1 by a) a, b ba 2 b 1 a 1,ba 1 b 2 a 4 (multiply r 1 = r 1 r 0 ) a, b ba 2 b 1 a 1, aba 1 b 2 a 3 (conjugate r 1 by a) a, b ba 2 b 1 a 1,b 2 a 3 ba (multiply r 1 = r 1 r 0 ) a, b ba 2 b 1 a 1,a 3 bab 2 (conjugate r 1 by b 2 ) a, b ba 2 b 1 a 1,a 2 bab 1 a 2 b 1 (multiply r 1 = r 1 r 0 ) a, b ba 2 b 1 a 1, abab 1 a 4 b 1 (multiply r 1 = r 1 r 0 ) a, b ba 2 b 1 a 1,ab 1 a 6 (multiply r 1 = r 1 r 0 ) a, b ba 2 b 1 a 1,a 7 b 1 (conjugate r 1 by ba 1 ) a, b a 2 b 1 a 6,a 7 b 1 (multiply r 0 = r 0 r 1 ) a, b a 6 ba 2,a 7 b 1 (invert r 0 ) a, b a 6 ba 2,ab 1 a 6 (conjugate r 1 by ab 1 ) a, b a 6 ba 2,a 1 (multiply r 1 = r 1 r 0 ) The importance of maximum depth and maximum relator length to computer optimization should be obvious. However, these factors play a crucial role in the viability of the conjecture itself, as embodied in Lemma 3.3 below. Definition 3.1. Let P consist of all balanced presentations of the trivial group on n generators. Let c(p ) = max { r i : r i is a relator of P } i denote the complexity of a balanced presentation on n generators P. Define P i = {P P: c(p ) i}, the set of balanced presentations on n generators with complexity at most i. Letδ, γ : N N be defined by and δ(m) = max{ σ : P P m,σ AC n, σ is the shortest word trivializing P } γ(m) = max{ r i : P P m,t= τ 1 τ 2...τ j AC n, t is the shortest word trivializing P and r i is a relator of one of P, τ j P, τ j 1 τ j P,...,tP.} Given a presentation P P, δ(c(p )) is an upper bound on the length of a sequence of Andrews Curtis moves needed to trivialize P if it is trivializable. Correspondingly, γ(c(p )) is the maximum amount by which any relator grows when such a P is trivialized. If P is not AC-trivializable, we can discover this by noting that no word σ AC n where σ δ(c(p )) trivializes P. In other words, δ represents searching the tree of AC moves to a certain depth, and γ represents searching this tree subject to the constraint that all searched nodes have a certain maximum complexity. Definition 3.2. The Andrews Curtis decision problem asks whether there is an AC-trivialization of a given presentation P P. Note that the Andrews Curtis conjecture implies that this decision problem is decidable, and the answer is always yes. Lemma 3.3. If either δ or γ is computable, then the Andrews Curtis decision problem is decidable. Proof: Given P P, there is a finite number of presentations with complexity at most δ(c(p )) or γ(c(p )) reachable from P by Andrews Curtis moves. If any of these presentations is the trivial presentation, then P is AC-trivializable. Otherwise, it is not. 4. CONCLUSION We have presented a program that enumerates words in AC n. The program makes effective use of disk-based storage to ensure scalability, but the longer access times for disk-based storage mean that performance must receive careful consideration. In order to reduce the size of the search space (and thus increase performance), a notion

5 Bowman and McCaul: Fast Searching for Andrews Curtis Trivializations 197 of canonical presentation was introduced. This concept simplifies the hash table used to keep track of which presentations have been visited. We applied the program to the search for AC trivializations of the smallest potential counterexample of the AC conjecture, the Akbulut Kirby presentation for n = 3. We showed that some presentations in a sequence due to Gordon are AC-trivializable and demonstrated that disk-based storage is useful for finding long trivializations that would not fit in the memory of a typical computer. Finally, we discussed some connections between computability and the Andrews Curtis conjecture. ACKNOWLEDGMENTS Time on the mainframe was graciously donated by Rocket Software, Inc. Thanks to Yo av Rieck and Chaim Goodman- Strauss for many valuable discussions on this topic. REFERENCES [Andrews and Curtis 65] J. Andrews and M. Curtis. Free Groups and Handlebodies. Proceedings of the American Mathematical Society 16 (1965). [Brown 84] R. Brown. Coproducts of Crossed P -Modules: Applications to Second Homotopy Groups and to the Homology of Groups. Topology 23:3 (1984), [Casson 03] A. Casson. The Poincaré Conjecture and the Andrews Curtis Conjecture. Lectures given at the Spring Lecture Series, University of Arkansas, [Havas and Ramsay 03] G. Havas and C. Ramsay. Breadth- First Search and the Andrews Curtis Conjecture. International Journal of Algebra and Computation 13:1 (2003). [Knuth 73] D. E. Knuth. The Art of Computer Programming. Vol. 3: Sorting and Searching. Reading, MA: Addison- Wesley, [Miasnikov 99] A. D. Miasnikov. Genetic Algorithms and the Andrews Curtis Conjecture. Internat. J. Algebra Comput. 9:6 (1999), R. Sean Bowman, Department of Mathematical Sciences, University of Arkansas, Fayetteville, AR (sean@rootnode.com) Stephen B. McCaul, Rocket Software, Inc., Bentonville, AR (stephen@gizmoworks.com) Received November 7, 2005; accepted December 5, 2005.

6

SHORT BALANCED PRESENTATIONS OF PERFECT GROUPS

SHORT BALANCED PRESENTATIONS OF PERFECT GROUPS SHORT BALANCED PRESENTATIONS OF PERFECT GROUPS GEORGE HAVAS and COLIN RAMSAY 1 Centre for Discrete Mathematics and Computing, School of Information Technology and Electrical Engineering, The University

More information

A linear equation in two variables is generally written as follows equation in three variables can be written as

A linear equation in two variables is generally written as follows equation in three variables can be written as System of Equations A system of equations is a set of equations considered simultaneously. In this course, we will discuss systems of equation in two or three variables either linear or quadratic or a

More information

CSE373: Data Structures and Algorithms Lecture 3: Math Review; Algorithm Analysis. Catie Baker Spring 2015

CSE373: Data Structures and Algorithms Lecture 3: Math Review; Algorithm Analysis. Catie Baker Spring 2015 CSE373: Data Structures and Algorithms Lecture 3: Math Review; Algorithm Analysis Catie Baker Spring 2015 Today Registration should be done. Homework 1 due 11:59pm next Wednesday, April 8 th. Review math

More information

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Limitations of Algorithms We conclude with a discussion of the limitations of the power of algorithms. That is, what kinds

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

Implementations of 3 Types of the Schreier-Sims Algorithm

Implementations of 3 Types of the Schreier-Sims Algorithm Implementations of 3 Types of the Schreier-Sims Algorithm Martin Jaggi m.jaggi@gmx.net MAS334 - Mathematics Computing Project Under supervison of Dr L.H.Soicher Queen Mary University of London March 2005

More information

ECS 120 Lesson 23 The Class P

ECS 120 Lesson 23 The Class P ECS 120 Lesson 23 The Class P Oliver Kreylos Wednesday, May 23th, 2001 We saw last time how to analyze the time complexity of Turing Machines, and how to classify languages into complexity classes. We

More information

11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic

11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic 11 Division Mod n, Linear Integer Equations, Random Numbers, The Fundamental Theorem of Arithmetic Bezout s Lemma Let's look at the values of 4x + 6y when x and y are integers. If x is -6 and y is 4 we

More information

Title. Citation Information Processing Letters, 112(16): Issue Date Doc URLhttp://hdl.handle.net/2115/ Type.

Title. Citation Information Processing Letters, 112(16): Issue Date Doc URLhttp://hdl.handle.net/2115/ Type. Title Counterexamples to the long-standing conjectur Author(s) Yoshinaka, Ryo; Kawahara, Jun; Denzumi, Shuhei Citation Information Processing Letters, 112(16): 636-6 Issue Date 2012-08-31 Doc URLhttp://hdl.handle.net/2115/50105

More information

2 Permutation Groups

2 Permutation Groups 2 Permutation Groups Last Time Orbit/Stabilizer algorithm: Orbit of a point. Transversal of transporter elements. Generators for stabilizer. Today: Use in a ``divide-and-conquer approach for permutation

More information

Basic Algorithms for Permutation Groups

Basic Algorithms for Permutation Groups Basic Algorithms for Permutation Groups Alexander Hulpke Department of Mathematics Colorado State University Fort Collins, CO, 80523-1874 Arizona Summer Program 2008 JAH, Arizona Summer Program 2008 Basic

More information

Algorithms for pattern involvement in permutations

Algorithms for pattern involvement in permutations Algorithms for pattern involvement in permutations M. H. Albert Department of Computer Science R. E. L. Aldred Department of Mathematics and Statistics M. D. Atkinson Department of Computer Science D.

More information

Data Structures. Outline. Introduction. Andres Mendez-Vazquez. December 3, Data Manipulation Examples

Data Structures. Outline. Introduction. Andres Mendez-Vazquez. December 3, Data Manipulation Examples Data Structures Introduction Andres Mendez-Vazquez December 3, 2015 1 / 53 Outline 1 What the Course is About? Data Manipulation Examples 2 What is a Good Algorithm? Sorting Example A Naive Algorithm Counting

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity 1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

Total Ordering on Subgroups and Cosets

Total Ordering on Subgroups and Cosets Total Ordering on Subgroups and Cosets Alexander Hulpke Department of Mathematics Colorado State University 1874 Campus Delivery Fort Collins, CO 80523-1874 hulpke@math.colostate.edu Steve Linton Centre

More information

NP-Completeness. Algorithmique Fall semester 2011/12

NP-Completeness. Algorithmique Fall semester 2011/12 NP-Completeness Algorithmique Fall semester 2011/12 1 What is an Algorithm? We haven t really answered this question in this course. Informally, an algorithm is a step-by-step procedure for computing a

More information

Designing Information Devices and Systems I Spring 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way

Designing Information Devices and Systems I Spring 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way EECS 16A Designing Information Devices and Systems I Spring 018 Lecture Notes Note 1 1.1 Introduction to Linear Algebra the EECS Way In this note, we will teach the basics of linear algebra and relate

More information

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each

More information

Linear Equations in Linear Algebra

Linear Equations in Linear Algebra 1 Linear Equations in Linear Algebra 1.1 SYSTEMS OF LINEAR EQUATIONS LINEAR EQUATION x 1,, x n A linear equation in the variables equation that can be written in the form a 1 x 1 + a 2 x 2 + + a n x n

More information

CS/IT OPERATING SYSTEMS

CS/IT OPERATING SYSTEMS CS/IT 5 (CR) Total No. of Questions :09] [Total No. of Pages : 0 II/IV B.Tech. DEGREE EXAMINATIONS, DECEMBER- 06 CS/IT OPERATING SYSTEMS. a) System Boot Answer Question No. Compulsory. Answer One Question

More information

Breadth First Search, Dijkstra s Algorithm for Shortest Paths

Breadth First Search, Dijkstra s Algorithm for Shortest Paths CS 374: Algorithms & Models of Computation, Spring 2017 Breadth First Search, Dijkstra s Algorithm for Shortest Paths Lecture 17 March 1, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 42 Part I Breadth

More information

Katholieke Universiteit Leuven Department of Computer Science

Katholieke Universiteit Leuven Department of Computer Science On the maximal cycle and transient lengths of circular cellular automata Kim Weyns, Bart Demoen Report CW 375, December 2003 Katholieke Universiteit Leuven Department of Computer Science Celestijnenlaan

More information

arxiv: v1 [math.co] 3 Feb 2014

arxiv: v1 [math.co] 3 Feb 2014 Enumeration of nonisomorphic Hamiltonian cycles on square grid graphs arxiv:1402.0545v1 [math.co] 3 Feb 2014 Abstract Ed Wynn 175 Edmund Road, Sheffield S2 4EG, U.K. The enumeration of Hamiltonian cycles

More information

Automata-Theoretic LTL Model-Checking

Automata-Theoretic LTL Model-Checking Automata-Theoretic LTL Model-Checking Arie Gurfinkel arie@cmu.edu SEI/CMU Automata-Theoretic LTL Model-Checking p.1 LTL - Linear Time Logic (Pn 77) Determines Patterns on Infinite Traces Atomic Propositions

More information

Solving the Hamiltonian Cycle problem using symbolic determinants

Solving the Hamiltonian Cycle problem using symbolic determinants Solving the Hamiltonian Cycle problem using symbolic determinants V. Ejov, J.A. Filar, S.K. Lucas & J.L. Nelson Abstract In this note we show how the Hamiltonian Cycle problem can be reduced to solving

More information

Algorithm Efficiency. Algorithmic Thinking Luay Nakhleh Department of Computer Science Rice University

Algorithm Efficiency. Algorithmic Thinking Luay Nakhleh Department of Computer Science Rice University Algorithm Efficiency Algorithmic Thinking Luay Nakhleh Department of Computer Science Rice University 1 All Correct Algorithms Are Not Created Equal When presented with a set of correct algorithms for

More information

AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS

AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS MAX GOLDBERG Abstract. We explore ways to concisely describe circulant graphs, highly symmetric graphs with properties that are easier to generalize

More information

Designing Information Devices and Systems I Fall 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way

Designing Information Devices and Systems I Fall 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way EECS 16A Designing Information Devices and Systems I Fall 018 Lecture Notes Note 1 1.1 Introduction to Linear Algebra the EECS Way In this note, we will teach the basics of linear algebra and relate it

More information

DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS

DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS JOEL BAKER Abstract. The goal of this expository paper is to introduce De Bruijn graphs and discuss their applications to fault tolerant

More information

NP-Completeness. Until now we have been designing algorithms for specific problems

NP-Completeness. Until now we have been designing algorithms for specific problems NP-Completeness 1 Introduction Until now we have been designing algorithms for specific problems We have seen running times O(log n), O(n), O(n log n), O(n 2 ), O(n 3 )... We have also discussed lower

More information

Words with the Smallest Number of Closed Factors

Words with the Smallest Number of Closed Factors Words with the Smallest Number of Closed Factors Gabriele Fici Zsuzsanna Lipták Abstract A word is closed if it contains a factor that occurs both as a prefix and as a suffix but does not have internal

More information

CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010

CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010 CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010 Computational complexity studies the amount of resources necessary to perform given computations.

More information

CSE 4502/5717 Big Data Analytics Spring 2018; Homework 1 Solutions

CSE 4502/5717 Big Data Analytics Spring 2018; Homework 1 Solutions CSE 502/5717 Big Data Analytics Spring 2018; Homework 1 Solutions 1. Consider the following algorithm: for i := 1 to α n log e n do Pick a random j [1, n]; If a[j] = a[j + 1] or a[j] = a[j 1] then output:

More information

arxiv: v2 [cs.ds] 3 Oct 2017

arxiv: v2 [cs.ds] 3 Oct 2017 Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract

More information

Groebner Bases and related methods in Group Theory

Groebner Bases and related methods in Group Theory Groebner Bases and related methods in Group Theory Alexander Hulpke Department of Mathematics Colorado State University Fort Collins, CO, 80523-1874 Workshop D1, Linz, 5/4/06 JAH, Workshop D1, Linz, 5/4/06

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Complexity, Undecidability and Tilings. Chaim Goodman-Strauss Univ Arkansas

Complexity, Undecidability and Tilings. Chaim Goodman-Strauss Univ Arkansas Complexity, Undecidability and Tilings Chaim Goodman-Strauss Univ Arkansas strauss@uark.edu Why are tiling puzzles difficult? Why are tiling puzzles difficult? (And how difficult are they anyway?) There

More information

Scharlemann s manifold is standard

Scharlemann s manifold is standard Annals of Mathematics, 149 (1999), 497 510 Scharlemann s manifold is standard By Selman Akbulut* Dedicated to Robion Kirby on the occasion of his 60 th birthday Abstract In his 1974 thesis, Martin Scharlemann

More information

Learning Large-Alphabet and Analog Circuits with Value Injection Queries

Learning Large-Alphabet and Analog Circuits with Value Injection Queries Learning Large-Alphabet and Analog Circuits with Value Injection Queries Dana Angluin 1 James Aspnes 1, Jiang Chen 2, Lev Reyzin 1,, 1 Computer Science Department, Yale University {angluin,aspnes}@cs.yale.edu,

More information

Enumeration and generation of all constitutional alkane isomers of methane to icosane using recursive generation and a modified Morgan s algorithm

Enumeration and generation of all constitutional alkane isomers of methane to icosane using recursive generation and a modified Morgan s algorithm The C n H 2n+2 challenge Zürich, November 21st 2015 Enumeration and generation of all constitutional alkane isomers of methane to icosane using recursive generation and a modified Morgan s algorithm Andreas

More information

SF2729 GROUPS AND RINGS LECTURE NOTES

SF2729 GROUPS AND RINGS LECTURE NOTES SF2729 GROUPS AND RINGS LECTURE NOTES 2011-03-01 MATS BOIJ 6. THE SIXTH LECTURE - GROUP ACTIONS In the sixth lecture we study what happens when groups acts on sets. 1 Recall that we have already when looking

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Figure 1. Symmetries of an equilateral triangle

Figure 1. Symmetries of an equilateral triangle 1. Groups Suppose that we take an equilateral triangle and look at its symmetry group. There are two obvious sets of symmetries. First one can rotate the triangle through 120. Suppose that we choose clockwise

More information

CSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: Oct 26. Homework #2. ( Due: Nov 8 )

CSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: Oct 26. Homework #2. ( Due: Nov 8 ) CSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: Oct 26 Homework #2 ( Due: Nov 8 ) Task 1. [ 80 Points ] Average Case Analysis of Median-of-3 Quicksort Consider the median-of-3 quicksort algorithm

More information

Informed Search. Chap. 4. Breadth First. O(Min(N,B L )) BFS. Search. have same cost BIBFS. Bi- Direction. O(Min(N,2B L/2 )) BFS. have same cost UCS

Informed Search. Chap. 4. Breadth First. O(Min(N,B L )) BFS. Search. have same cost BIBFS. Bi- Direction. O(Min(N,2B L/2 )) BFS. have same cost UCS Informed Search Chap. 4 Material in part from http://www.cs.cmu.edu/~awm/tutorials Uninformed Search Complexity N = Total number of states B = Average number of successors (branching factor) L = Length

More information

Analysis of Algorithms [Reading: CLRS 2.2, 3] Laura Toma, csci2200, Bowdoin College

Analysis of Algorithms [Reading: CLRS 2.2, 3] Laura Toma, csci2200, Bowdoin College Analysis of Algorithms [Reading: CLRS 2.2, 3] Laura Toma, csci2200, Bowdoin College Why analysis? We want to predict how the algorithm will behave (e.g. running time) on arbitrary inputs, and how it will

More information

CS 4407 Algorithms Lecture: Shortest Path Algorithms

CS 4407 Algorithms Lecture: Shortest Path Algorithms CS 440 Algorithms Lecture: Shortest Path Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Outline Shortest Path Problem General Lemmas and Theorems. Algorithms Bellman-Ford

More information

Lecture 9: Elementary Matrices

Lecture 9: Elementary Matrices Lecture 9: Elementary Matrices Review of Row Reduced Echelon Form Consider the matrix A and the vector b defined as follows: 1 2 1 A b 3 8 5 A common technique to solve linear equations of the form Ax

More information

Advanced topic: Space complexity

Advanced topic: Space complexity Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to

More information

Theory of Computing Tamás Herendi

Theory of Computing Tamás Herendi Theory of Computing Tamás Herendi Theory of Computing Tamás Herendi Publication date 2014 Table of Contents 1 Preface 1 2 Formal languages 2 3 Order of growth rate 9 4 Turing machines 16 1 The definition

More information

Alternative Combinatorial Gray Codes

Alternative Combinatorial Gray Codes Alternative Combinatorial Gray Codes Cormier-Iijima, Samuel sciyoshi@gmail.com December 17, 2010 Abstract Gray codes have numerous applications in a variety of fields, including error correction, encryption,

More information

Informed Search. Day 3 of Search. Chap. 4, Russel & Norvig. Material in part from

Informed Search. Day 3 of Search. Chap. 4, Russel & Norvig. Material in part from Informed Search Day 3 of Search Chap. 4, Russel & Norvig Material in part from http://www.cs.cmu.edu/~awm/tutorials Uninformed Search Complexity N = Total number of states B = Average number of successors

More information

Time Complexity (1) CSCI Spring Original Slides were written by Dr. Frederick W Maier. CSCI 2670 Time Complexity (1)

Time Complexity (1) CSCI Spring Original Slides were written by Dr. Frederick W Maier. CSCI 2670 Time Complexity (1) Time Complexity (1) CSCI 2670 Original Slides were written by Dr. Frederick W Maier Spring 2014 Time Complexity So far we ve dealt with determining whether or not a problem is decidable. But even if it

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

CSE 202 Homework 4 Matthias Springer, A

CSE 202 Homework 4 Matthias Springer, A CSE 202 Homework 4 Matthias Springer, A99500782 1 Problem 2 Basic Idea PERFECT ASSEMBLY N P: a permutation P of s i S is a certificate that can be checked in polynomial time by ensuring that P = S, and

More information

NON-COMMUTATIVE POLYNOMIAL COMPUTATIONS

NON-COMMUTATIVE POLYNOMIAL COMPUTATIONS NON-COMMUTATIVE POLYNOMIAL COMPUTATIONS ARJEH M. COHEN These notes describe some of the key algorithms for non-commutative polynomial rings. They are intended for the Masterclass Computer algebra, Spring

More information

CMPSCI 611: Advanced Algorithms

CMPSCI 611: Advanced Algorithms CMPSCI 611: Advanced Algorithms Lecture 12: Network Flow Part II Andrew McGregor Last Compiled: December 14, 2017 1/26 Definitions Input: Directed Graph G = (V, E) Capacities C(u, v) > 0 for (u, v) E and

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

On the Relative Trust between Inconsistent Data and Inaccurate Constraints

On the Relative Trust between Inconsistent Data and Inaccurate Constraints On the Relative Trust between Inconsistent Data and Inaccurate Constraints George Beskales 1 Ihab F. Ilyas 1 Lukasz Golab 2 Artur Galiullin 2 1 Qatar Computing Research Institute 2 University of Waterloo

More information

ICS 252 Introduction to Computer Design

ICS 252 Introduction to Computer Design ICS 252 fall 2006 Eli Bozorgzadeh Computer Science Department-UCI References and Copyright Textbooks referred [Mic94] G. De Micheli Synthesis and Optimization of Digital Circuits McGraw-Hill, 1994. [CLR90]

More information

Institute of Operating Systems and Computer Networks Algorithms Group. Network Algorithms. Tutorial 3: Shortest paths and other stuff

Institute of Operating Systems and Computer Networks Algorithms Group. Network Algorithms. Tutorial 3: Shortest paths and other stuff Institute of Operating Systems and Computer Networks Algorithms Group Network Algorithms Tutorial 3: Shortest paths and other stuff Christian Rieck Shortest paths: Dijkstra s algorithm 2 Dijkstra s algorithm

More information

Theory of Computation

Theory of Computation Theory of Computation Lecture #2 Sarmad Abbasi Virtual University Sarmad Abbasi (Virtual University) Theory of Computation 1 / 1 Lecture 2: Overview Recall some basic definitions from Automata Theory.

More information

Computational Boolean Algebra. Pingqiang Zhou ShanghaiTech University

Computational Boolean Algebra. Pingqiang Zhou ShanghaiTech University Computational Boolean Algebra Pingqiang Zhou ShanghaiTech University Announcements Written assignment #1 is out. Due: March 24 th, in class. Programming assignment #1 is out. Due: March 24 th, 11:59PM.

More information

Today s class. Constrained optimization Linear programming. Prof. Jinbo Bi CSE, UConn. Numerical Methods, Fall 2011 Lecture 12

Today s class. Constrained optimization Linear programming. Prof. Jinbo Bi CSE, UConn. Numerical Methods, Fall 2011 Lecture 12 Today s class Constrained optimization Linear programming 1 Midterm Exam 1 Count: 26 Average: 73.2 Median: 72.5 Maximum: 100.0 Minimum: 45.0 Standard Deviation: 17.13 Numerical Methods Fall 2011 2 Optimization

More information

GENERALIZED BRAUER TREE ORDERS

GENERALIZED BRAUER TREE ORDERS C O L L O Q U I U M M A T H E M A T I C U M VOL. 71 1996 NO. 2 GENERALIZED BRAUER TREE ORDERS BY K. W. R O G G E N K A M P (STUTTGART) Introduction. p-adic blocks of integral group rings with cyclic defect

More information

Lecture 31: Reductions

Lecture 31: Reductions Lecture 31: Page 1 of 10 Aims: To discuss the idea of a reduction and reducibility; To discuss the idea of polynomial-time reductions, and to see what we can learn from them; To see what we can learn from

More information

Data Structures in Java

Data Structures in Java Data Structures in Java Lecture 21: Introduction to NP-Completeness 12/9/2015 Daniel Bauer Algorithms and Problem Solving Purpose of algorithms: find solutions to problems. Data Structures provide ways

More information

Algorithms: Lecture 12. Chalmers University of Technology

Algorithms: Lecture 12. Chalmers University of Technology Algorithms: Lecture 1 Chalmers University of Technology Today s Topics Shortest Paths Network Flow Algorithms Shortest Path in a Graph Shortest Path Problem Shortest path network. Directed graph G = (V,

More information

The Symmetric Shortest-Path Table Routing Conjecture

The Symmetric Shortest-Path Table Routing Conjecture The Symmetric Shortest-Path Table Routing Conjecture Thomas L. Rodeheffer Microsoft Research, Silicon Valley May 24, 23 Abstract A symmetric shortest-path table routing is a set of paths between all pairs

More information

Coloring Vertices and Edges of a Path by Nonempty Subsets of a Set

Coloring Vertices and Edges of a Path by Nonempty Subsets of a Set Coloring Vertices and Edges of a Path by Nonempty Subsets of a Set P.N. Balister E. Győri R.H. Schelp November 8, 28 Abstract A graph G is strongly set colorable if V (G) E(G) can be assigned distinct

More information

Symbolic Model Checking with ROBDDs

Symbolic Model Checking with ROBDDs Symbolic Model Checking with ROBDDs Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 14, 2016 c JPK Symbolic

More information

CSE 241 Class 1. Jeremy Buhler. August 24,

CSE 241 Class 1. Jeremy Buhler. August 24, CSE 41 Class 1 Jeremy Buhler August 4, 015 Before class, write URL on board: http://classes.engineering.wustl.edu/cse41/. Also: Jeremy Buhler, Office: Jolley 506, 314-935-6180 1 Welcome and Introduction

More information

Constraint satisfaction search. Combinatorial optimization search.

Constraint satisfaction search. Combinatorial optimization search. CS 1571 Introduction to AI Lecture 8 Constraint satisfaction search. Combinatorial optimization search. Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square Constraint satisfaction problem (CSP) Objective:

More information

1 Reductions and Expressiveness

1 Reductions and Expressiveness 15-451/651: Design & Analysis of Algorithms November 3, 2015 Lecture #17 last changed: October 30, 2015 In the past few lectures we have looked at increasingly more expressive problems solvable using efficient

More information

Fundamental Algorithms 11

Fundamental Algorithms 11 Technische Universität München WS 2013/14 Institut für Informatik Worksheet Scientific Computing in Computer Science 20.01.2014 Fundamental Algorithms 11 Exercise 1 Hypergraphs A hypergraph extends the

More information

QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS

QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS DIANNE P. O LEARY AND STEPHEN S. BULLOCK Dedicated to Alan George on the occasion of his 60th birthday Abstract. Any matrix A of dimension m n (m n)

More information

Heuristics for The Whitehead Minimization Problem

Heuristics for The Whitehead Minimization Problem Heuristics for The Whitehead Minimization Problem R.M. Haralick, A.D. Miasnikov and A.G. Myasnikov November 11, 2004 Abstract In this paper we discuss several heuristic strategies which allow one to solve

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 1: Introduction, Easy Examples Karl Bringmann and Sebastian Krinninger Audience no formal requirements, but: NP-hardness, satisfiability problem, how

More information

Bounds on the Traveling Salesman Problem

Bounds on the Traveling Salesman Problem Bounds on the Traveling Salesman Problem Sean Zachary Roberson Texas A&M University MATH 613, Graph Theory A common routing problem is as follows: given a collection of stops (for example, towns, stations,

More information

CS/COE

CS/COE CS/COE 1501 www.cs.pitt.edu/~nlf4/cs1501/ P vs NP But first, something completely different... Some computational problems are unsolvable No algorithm can be written that will always produce the correct

More information

Computational Models - Lecture 5 1

Computational Models - Lecture 5 1 Computational Models - Lecture 5 1 Handout Mode Iftach Haitner. Tel Aviv University. November 28, 2016 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice Herlihy, Brown University.

More information

Analysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes

Analysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes Analysis of Algorithms Single Source Shortest Path Andres Mendez-Vazquez November 9, 01 1 / 108 Outline 1 Introduction Introduction and Similar Problems General Results Optimal Substructure Properties

More information

Counting. 1 Sum Rule. Example 1. Lecture Notes #1 Sept 24, Chris Piech CS 109

Counting. 1 Sum Rule. Example 1. Lecture Notes #1 Sept 24, Chris Piech CS 109 1 Chris Piech CS 109 Counting Lecture Notes #1 Sept 24, 2018 Based on a handout by Mehran Sahami with examples by Peter Norvig Although you may have thought you had a pretty good grasp on the notion of

More information

Lecture 2. 1 More N P-Compete Languages. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz

Lecture 2. 1 More N P-Compete Languages. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 2 1 More N P-Compete Languages It will be nice to find more natural N P-complete languages. To that end, we ine

More information

A General Lower Bound on the I/O-Complexity of Comparison-based Algorithms

A General Lower Bound on the I/O-Complexity of Comparison-based Algorithms A General Lower ound on the I/O-Complexity of Comparison-based Algorithms Lars Arge Mikael Knudsen Kirsten Larsent Aarhus University, Computer Science Department Ny Munkegade, DK-8000 Aarhus C. August

More information

Lecture 7: More Arithmetic and Fun With Primes

Lecture 7: More Arithmetic and Fun With Primes IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 7: More Arithmetic and Fun With Primes David Mix Barrington and Alexis Maciel July

More information

Hidden Markov Models Part 2: Algorithms

Hidden Markov Models Part 2: Algorithms Hidden Markov Models Part 2: Algorithms CSE 6363 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington 1 Hidden Markov Model An HMM consists of:

More information

Theory of Computation Lecture Notes

Theory of Computation Lecture Notes Theory of Computation Lecture Notes Prof. Yuh-Dauh Lyuu Dept. Computer Science & Information Engineering and Department of Finance National Taiwan University c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan

More information

Partha Sarathi Mandal

Partha Sarathi Mandal MA 252: Data Structures and Algorithms Lecture 32 http://www.iitg.ernet.in/psm/indexing_ma252/y12/index.html Partha Sarathi Mandal Dept. of Mathematics, IIT Guwahati The All-Pairs Shortest Paths Problem

More information

Undecibability. Hilbert's 10th Problem: Give an algorithm that given a polynomial decides if the polynomial has integer roots or not.

Undecibability. Hilbert's 10th Problem: Give an algorithm that given a polynomial decides if the polynomial has integer roots or not. Undecibability Hilbert's 10th Problem: Give an algorithm that given a polynomial decides if the polynomial has integer roots or not. The problem was posed in 1900. In 1970 it was proved that there can

More information

Complexity and NP-completeness

Complexity and NP-completeness Lecture 17 Complexity and NP-completeness Supplemental reading in CLRS: Chapter 34 As an engineer or computer scientist, it is important not only to be able to solve problems, but also to know which problems

More information

Growth functions of braid monoids and generation of random braids

Growth functions of braid monoids and generation of random braids Growth functions of braid monoids and generation of random braids Universidad de Sevilla Joint with Volker Gebhardt Introduction Random braids Most authors working in braid-cryptography or computational

More information

Algorithms and Data Structures 2016 Week 5 solutions (Tues 9th - Fri 12th February)

Algorithms and Data Structures 2016 Week 5 solutions (Tues 9th - Fri 12th February) Algorithms and Data Structures 016 Week 5 solutions (Tues 9th - Fri 1th February) 1. Draw the decision tree (under the assumption of all-distinct inputs) Quicksort for n = 3. answer: (of course you should

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Logic Circuits Design Seminars WS2010/2011, Lecture 2 Ing. Petr Fišer, Ph.D. Department of Digital Design Faculty of Information Technology Czech Technical University in Prague

More information

What s category theory, anyway? Dedicated to the memory of Dietmar Schumacher ( )

What s category theory, anyway? Dedicated to the memory of Dietmar Schumacher ( ) What s category theory, anyway? Dedicated to the memory of Dietmar Schumacher (1935-2014) Robert Paré November 7, 2014 Many subjects How many subjects are there in mathematics? Many subjects How many subjects

More information

1 Closest Pair of Points on the Plane

1 Closest Pair of Points on the Plane CS 31: Algorithms (Spring 2019): Lecture 5 Date: 4th April, 2019 Topic: Divide and Conquer 3: Closest Pair of Points on a Plane Disclaimer: These notes have not gone through scrutiny and in all probability

More information

EFFICIENT SIMPLE GROUPS. Colin M. Campbell. Mathematical Institute University of St Andrews North Haugh, St Andrews, Fife KY16 9SS, SCOTLAND

EFFICIENT SIMPLE GROUPS. Colin M. Campbell. Mathematical Institute University of St Andrews North Haugh, St Andrews, Fife KY16 9SS, SCOTLAND EFFICIENT SIMPLE GROUPS Colin M. Campbell Mathematical Institute University of St Andrews North Haugh, St Andrews, Fife KY16 9SS, SCOTLAND George Havas Centre for Discrete Mathematics and Computing School

More information

x y B =. v u Note that the determinant of B is xu + yv = 1. Thus B is invertible, with inverse u y v x On the other hand, d BA = va + ub 2

x y B =. v u Note that the determinant of B is xu + yv = 1. Thus B is invertible, with inverse u y v x On the other hand, d BA = va + ub 2 5. Finitely Generated Modules over a PID We want to give a complete classification of finitely generated modules over a PID. ecall that a finitely generated module is a quotient of n, a free module. Let

More information

Discrete-event simulations

Discrete-event simulations Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;

More information

Combinatorial Method in the Coset Enumeration. of Symmetrically Generated Groups II: Monomial Modular Representations

Combinatorial Method in the Coset Enumeration. of Symmetrically Generated Groups II: Monomial Modular Representations International Journal of Algebra, Vol. 1, 2007, no. 11, 505-518 Combinatorial Method in the Coset Enumeration of Symmetrically Generated Groups II: Monomial Modular Representations Mohamed Sayed Department

More information